US20100223369A1 - Systems and methods for depopulation of user data from network - Google Patents

Systems and methods for depopulation of user data from network Download PDF

Info

Publication number
US20100223369A1
US20100223369A1 US12/395,456 US39545609A US2010223369A1 US 20100223369 A1 US20100223369 A1 US 20100223369A1 US 39545609 A US39545609 A US 39545609A US 2010223369 A1 US2010223369 A1 US 2010223369A1
Authority
US
United States
Prior art keywords
user
network
user data
change
status
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/395,456
Other versions
US9558195B2 (en
Inventor
Michael Paul DeHaan
Adrian Karstan Likins
Seth Kelby Vidal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Red Hat Inc
Original Assignee
Red Hat Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Red Hat Inc filed Critical Red Hat Inc
Priority to US12/395,456 priority Critical patent/US9558195B2/en
Assigned to RED HAT, INC. reassignment RED HAT, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DEHAAN, MICHAEL PAUL, LIKINS, ADRIAN KARSTAN, VIDAL, SETH KELBY
Publication of US20100223369A1 publication Critical patent/US20100223369A1/en
Application granted granted Critical
Publication of US9558195B2 publication Critical patent/US9558195B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations

Definitions

  • the present teachings relate to systems and methods for the depopulation of user data from a network, and more particularly to platforms and techniques for automatically scanning a network for files, processes, profiles, and/or other data related to a user whose user ID is changed or deactivated in the network.
  • a management server can be used to issue commands to hosts or other network nodes to manage the configuration of the network hosts, underlying clients or other devices.
  • a network management platform can have the responsibility of maintaining a set of valid user IDs and resources and privileges associated with those user Ids.
  • a user can undergo a change in status in their employment, subscription, or other relationship to the network to which they are registered.
  • a user can have a change in marital status and a resulting change in their legal name, or can depart from a company or other organization.
  • the accumulated files, user profiles, processes, or other resources associated with the user ID for that user may remain in the network.
  • FIG. 1 illustrates an overall network in which systems and methods for depopulation of user data from a network can be implemented, according to various embodiments of the present teachings
  • FIG. 2 illustrates an overall network in which systems and methods for depopulation of user data from a network can be implemented, according to various embodiments of the present teachings in further regards;
  • FIG. 4 illustrates overall network management processing for depopulation of user data from a network can be implemented, according to various embodiments of the present teachings.
  • Embodiments of the present teachings relate to systems and methods for depopulation of user data from a network. More particularly, embodiments relate to platforms and techniques in one regard for identifying obsolete or unwanted user IDs via a network management server, and automatically scanning the network to which the user IDs are registered to detect user data associated with those IDs.
  • the user data can be or include, for example, executing processes, services, user profiles, application or data files, or other user data authored by, belonging to, or otherwise associated with a user ID.
  • the user data can be stored or hosted in a variety of locations in the network, including, for example, databases or other data stores, servers, personal computers or workstations, removable media, and/or other locations.
  • the network management platform can commence a full-network scan to comprehensively access and examine all computing, storage, and/or other nodes in the network and search the directories, memory, storage, and/or other resources therein to detect processes, services, files, user profiles, or other user data associated with those user IDs.
  • the network management platform can then perform any desired modification or update to the user lDs and/or associated user data, such as, for example, changing the user IDs or data, exporting the user IDs or data, and/or deleting the user IDs or data.
  • the network management platform can thereby locate, update, and/or dispose of obsolete user IDs and/or user data from one central processing point, using comparatively compact global commands.
  • FIG. 1 illustrates an overall system 100 consistent with systems and methods for depopulating user data from a network, according to various embodiments of the present teachings.
  • a network management platform 102 can maintain and manage a managed network 116 .
  • Network management platform 102 can communicate with a set of supervisory hosts 112 via one or more networks 110 .
  • One or more networks 110 can be or include the Internet, or other public or private networks.
  • One or more networks 110 can be or include wired, wireless, optical, and other network connections.
  • Set of supervisory hosts 112 can be or include a set of servers configured to communicate with entities at other levels of one or more networks 110 and/or associated connections.
  • set of supervisory hosts 112 can communicate with an intermediate set or sets of hosts, gateways, or servers.
  • set of supervisory hosts 112 can function as “overlord” hosts or servers which communicate command data 120 to an underlying or low-level set of targets 180 , or other devices in managed network 116 .
  • Set of supervisory hosts 112 can support or serve an underlying managed network 116 , for example via a local area network, or other network(s) or connections.
  • Managed network 116 including set of targets 180 can be or include a set of personal computers, network-enabled media devices, or other clients, devices, or machines. Other hierarchies, topologies, and connections between network management platform 102 , set of supervisory hosts 112 , any intermediate hosts, set of targets 180 , and/or other entities or devices of managed network 116 can be used.
  • communications between network management platform 102 , set of supervisory hosts 112 , set of targets 180 , and/or other entities or devices in managed network 116 or other entities can be conducted via one or more secure channel 108 , such as the secure channel and related resources described in co-pending U.S. application Ser. No. 12/130,424, filed May 30, 2008, entitled “Systems and Methods for Remote Management of Networked Systems Using Secure Modular Platform,” which published as U.S. Patent Application Publication No. ______, assigned or under obligation of assignment to the same entity as this application, and which application is incorporated by reference herein.
  • Network management platform 102 can include or access resources to support the generation and transmission of one or more discovery command 120 via auto-discovered or other pathways to manage set of supervisory hosts 112 , set of targets 180 , and/or other entities or devices of managed network 116 , including a network store 104 .
  • Network store 104 can be or include a database or other data store, and in embodiments can store a network map 106 .
  • Network map 106 can record information related to the configuration and topology of network connections between set of supervisory hosts 112 , set of targets 180 , and/or other entities or devices of managed network 116 , as well as other data. In embodiments, network map 106 can be recorded in a file, tree, database, or other record.
  • network management platform 102 can access network map 106 to carry out management and maintenance operations on set of user IDs 162 .
  • Set of user IDs 162 can contain a set of user names, account names, account numbers, stored passwords, and/or other resources related to the identification and/or validation of users of managed network 116 .
  • each user ID in set of users IDs 162 can have an associated set of user data 164 hosted, stored, or located throughout the network of managed network 116 .
  • Set of user data 164 can be or include any one or more of processes, services, user profiles, data files such as database, word processing, spreadsheet, media, or other data files, application files, passwords or other credentials, and/or other data related to the user identified by a given user ID in set of user IDs 162 . Portions of user data in set of user data 164 can be located in diverse or multiple locations, such as in local or remote servers, personal computers or other client machines or devices, workstations, network-enabled mobile devices, databases, archives or RAID sites, or other nodes, facilities, or locations in managed network 116 .
  • Set of user data 164 can further comprise, for instance, files that contain references to a user ID which control access to applications or services, such as “/etc/group/.”
  • Set of user data 164 can likewise include information such as aliases, groups, access control lists (ACLs), references by user ID or user name, or other information.
  • Network management platform 102 can determine a set of target IDs 166 in set of user IDs 162 to locate, modify, and/or remove set of user data 164 in or from managed network 116 and/or associated network or networks.
  • set of target IDs 166 can be imported to network management platform 102 , and/or can be manually specified by a systems administrator or other user.
  • set of target IDs 166 can be generated by network management platform 102 , for example, by identifying all user IDs that have not been used for a defined period of time, such as one year or other period of time.
  • network management platform 102 can issue commands and/or invoke services to locate, modify, and/or purge set of target. IDs 166 and/or set of user data 164 associated with each of those user IDs.
  • Network management platform 102 can generate one or more discovery command 120 to transmit to set of supervisory hosts 112 , managed network 116 , one or more networks 110 , and/or other machines, locations, or resources.
  • One or more discovery command 120 can contain an identification of set of target IDs 166 and other data to locate, identify, authenticate, and/or set of user data 164 associated with those IDs in the overall network.
  • network management platform 102 can access network map 106 to identify one or more supervisory hosts in set of supervisory hosts 112 to or through which to transmit one or more discovery command 120 .
  • the recipient supervisory host(s) can receive one or more discovery command 120 and, in embodiments, access network map 106 and/or communicate with network management platform 102 to extract a pathway by which to relay or transmit one or more discovery command 120 to managed network 116 and/or other underlying devices.
  • the supervisory host(s) can then transmit or relay the one or more discovery command 120 to a target or targets in managed network 116 , using the identified pathway.
  • network management platform 102 can receive data back from set of supervisory hosts 112 , managed network 116 , and/or other resources indicating the presence of user data 164 for one or more user IDs in set of target lDs 166 . Upon detection of user data 164 for those user IDs, network management platform 102 can proceed to generate one or more modification command 168 to initiate a modification, update, migration, and/or deletion or removal of a portion or all of user data 164 , and/or set of target IDs 166 . For example, network management platform 102 can direct that files, directories, user profiles, and/or executing processes can be modified, updated, deleted, archived, terminated, removed, or otherwise processed to purge obsolete, inaccurate, insecure, or unwanted data.
  • the modification can include substituting a new user ID for an obsolete user ID.
  • the modification can include substituting new credentials, privileges, or other attributes for the existing attributes for the subject user ID.
  • Other modifications or processing of set of target IDs 166 can be done. For example, two or more user IDs and associated user data 164 can be combined, or a single user ID can be split into multiple user data 164 , IDs, or attributes.
  • network management platform 102 can be configured to periodically probe the network including set of manage machines 116 , set of supervisory hosts 112 , and/or other resources with repeated or additional one or more discovery command 120 , to locate files, processes, and/or other user data 164 that was not present, visible, or identifiable during previous scans.
  • a process of repeatedly interrogating the network for user data 164 can be repeated until a termination criteria are met, such as, for instance, the failure to discover any further user data 164 after a predetermined number of discovery attempts, or after a certain amount of time.
  • any of network management platform 102 , set of supervisory hosts 112 , any intermediate hosts, and/or managed network 116 or other entities can be significantly or substantially geographically distributed, and can represent relatively large-scale groupings or clusters.
  • different hosts in set of supervisory hosts 112 and/or associated targets in managed network 116 can be located in different metropolitan areas, in different sections of a country, in different countries, or in different continents.
  • different hosts in set of supervisory hosts 112 and/or sets of targets in managed network 116 can represent hundreds, thousands, or greater or lesser numbers of collective devices.
  • FIG. 3 illustrates an exemplary diagram of hardware and other resources that can be incorporated in a network management platform 102 configured to communicate with set of supervisory hosts 112 , any intermediate hosts, set of targets 180 , and/or other entities or devices of managed network 116 via one or more networks 110 or other connections, according to embodiments.
  • network management system 102 can comprise a processor 124 communicating with memory 126 , such as electronic random access memory, operating under control of or in conjunction with operating system 130 .
  • Operating system 130 can be, for example, a distribution of the LinuxTM operating system, the UnixTM operating system, or other open-source or proprietary operating system or platform.
  • Processor 124 also communicates with network store 104 , such as a database stored on a local hard drive.
  • Processor 124 further communicates with network interface 128 , such as an Ethernet or wireless data connection, which in turn communicates with one or more networks 110 , such as the Internet or other public or private networks.
  • Processor 124 also communicates with a network management module 132 , which can be or include logic to monitor and manage the operation of network 110 and associated or connected resources.
  • Network management module 132 can for instance permit a user to view, delegate, and execute configuration operations in set of supervisory hosts 112 , set of targets 180 , managed network 116 , and/or other resources or entities.
  • Other configurations of network management system 102 , associated network connections, and other hardware and software resources are possible.
  • FIG. 4 illustrates overall processing for depopulation of user data from a network, according to various embodiments of the present teachings.
  • processing can begin.
  • a secure channel 108 can be established between network management platform 102 and one or more networks 110 , set of supervisory hosts 112 , set of targets 180 , and/or other entities or devices of managed network 116 .
  • secure channel 108 can be or include a secure socket layer (SSL) connection, a public/private key infrastructure or connection, or other channel or connection.
  • SSL secure socket layer
  • network management platform 102 can access, receive, or generate set of target IDs 166 reflecting user lDs whose associated user data 164 is to be scanned for in the overall network.
  • network management platform 102 can transmit one or more discovery command 120 to one or more networks 110 , set of supervisory hosts 112 , set of targets 180 , or other devices, entities or resources of managed network 116 .
  • network management platform 102 can receive one or more responses from the network indicating the presence of user data 164 associated with set of target IDs 166 .
  • User data 164 can be or include processes, services, user profiles, data files, application files, and/or other data.
  • network management platform 102 can proceed to generate one or more modification command 168 to initiate a modification, update, and/or deletion or removal of a portion or all of user data 164 , and/or set of target IDs 166 .
  • network management platform 102 can direct that files, directories, user profiles, and/or executing processes can be modified, updated, deleted, archived, terminated, removed, or otherwise processed to purge obsolete, inaccurate, insecure, or unwanted data.
  • the modification, updating, and/or deletion of user data 164 can be carried out.
  • network management platform 102 can update set of user IDs 162 and/or any user data 164 to reflect the modifications or deletions, as appropriate.
  • network management platform 102 can store a record of all locations in which one or more of set of target IDs 166 and/or user data 164 were found, to record a map of user ID/user data repositories within the network, as appropriate.
  • processing can repeat, return to a prior processing point, jump to a further processing point, or end.
  • the overall network can be configured with multiple levels or layers of supervisory hosts (or “overlords”).
  • various targets in managed network 116 can be configured at different levels within the overall network.
  • the depopulation activity has been described as operating on a set of user IDs 162 and target IDs 166
  • other types of identifiers can be used.
  • user data 164 associated with a given address such as an Internet Protocol (IP) address, or other address or identifier, can be used to identify users or other entities for modification and/or removal.
  • IP Internet Protocol
  • Other resources described as singular or integrated can in embodiments be plural or distributed, and resources described as multiple or distributed can in embodiments be combined. The scope of the present teachings is accordingly intended to be limited only by the following claims.

Abstract

Embodiments relate to systems and methods for depopulation of user data from a network. A network management platform can communicate with a set of managed machines in a network, and generally manage user accounts including user lDs, associated network processes, services, application files, data files, and/or other user data. In embodiments, a user may have a change in status, such as departing from the organization operating the network, changing their name or user name, or other updates. In such cases, a systems administrator may need to update or delete files, processes, services, and/or other user data associated with the user from the network. The network management platform can interrogate the network for files, processes, or other resources associated with the user ID of interest. The search can exhaustively interrogate every available node in the network, to update or purge all files associated with the subject user ID(s).

Description

    FIELD
  • The present teachings relate to systems and methods for the depopulation of user data from a network, and more particularly to platforms and techniques for automatically scanning a network for files, processes, profiles, and/or other data related to a user whose user ID is changed or deactivated in the network.
  • BACKGROUND OF RELATED ART
  • A variety of network management platforms exist to assist network administrators with installing and configuring network resources and services. In many platforms, a management server can be used to issue commands to hosts or other network nodes to manage the configuration of the network hosts, underlying clients or other devices. As part of the management of comparatively large-scale and other networks, a network management platform can have the responsibility of maintaining a set of valid user IDs and resources and privileges associated with those user Ids.
  • It is a not infrequent occurrence in network operations that a user can undergo a change in status in their employment, subscription, or other relationship to the network to which they are registered. In a corporate setting, for example, a user can have a change in marital status and a resulting change in their legal name, or can depart from a company or other organization. In those and other cases, the accumulated files, user profiles, processes, or other resources associated with the user ID for that user may remain in the network.
  • In existing network management platforms, a systems administrator confronted with a set of obsolete user lDs has no particular tools or services available to them to locate and remote the undesired residual user IDs, and/or associated files, user profiles, processes, or other resources. Those managers therefore must typically access each individual data store, user machine, or other nodes on the managed network, and look for the out-of-date user data. It may thus be desirable to provide methods and systems that overcome these network management difficulties, and permit an administrator or other user to track down and update or remove obsolete user IDs and related user data.
  • DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the present teachings and together with the description, serve to explain the principles of the present teachings. In the figures:
  • FIG. 1 illustrates an overall network in which systems and methods for depopulation of user data from a network can be implemented, according to various embodiments of the present teachings;
  • FIG. 2 illustrates an overall network in which systems and methods for depopulation of user data from a network can be implemented, according to various embodiments of the present teachings in further regards;
  • FIG. 3 illustrates an exemplary hardware configuration of a network management platform that can be used in systems and methods for depopulation of user data from a network, according to various embodiments of the present teachings; and
  • FIG. 4 illustrates overall network management processing for depopulation of user data from a network can be implemented, according to various embodiments of the present teachings.
  • DESCRIPTION OF EMBODIMENTS
  • Embodiments of the present teachings relate to systems and methods for depopulation of user data from a network. More particularly, embodiments relate to platforms and techniques in one regard for identifying obsolete or unwanted user IDs via a network management server, and automatically scanning the network to which the user IDs are registered to detect user data associated with those IDs. The user data can be or include, for example, executing processes, services, user profiles, application or data files, or other user data authored by, belonging to, or otherwise associated with a user ID. The user data can be stored or hosted in a variety of locations in the network, including, for example, databases or other data stores, servers, personal computers or workstations, removable media, and/or other locations. When a systems administrator or other user desires to begin a purge of obsolete or undesired user IDs and associated user data, the network management platform can commence a full-network scan to comprehensively access and examine all computing, storage, and/or other nodes in the network and search the directories, memory, storage, and/or other resources therein to detect processes, services, files, user profiles, or other user data associated with those user IDs. The network management platform can then perform any desired modification or update to the user lDs and/or associated user data, such as, for example, changing the user IDs or data, exporting the user IDs or data, and/or deleting the user IDs or data. According to embodiments in one regard, the network management platform can thereby locate, update, and/or dispose of obsolete user IDs and/or user data from one central processing point, using comparatively compact global commands.
  • Reference will now be made in detail to exemplary embodiments of the present teachings, which are illustrated in the accompanying drawings. Where possible the same reference numbers will be used throughout the drawings to refer to the same or like parts.
  • FIG. 1 illustrates an overall system 100 consistent with systems and methods for depopulating user data from a network, according to various embodiments of the present teachings. In embodiments as shown, a network management platform 102 can maintain and manage a managed network 116. Network management platform 102 can communicate with a set of supervisory hosts 112 via one or more networks 110. One or more networks 110 can be or include the Internet, or other public or private networks. One or more networks 110 can be or include wired, wireless, optical, and other network connections. Set of supervisory hosts 112 can be or include a set of servers configured to communicate with entities at other levels of one or more networks 110 and/or associated connections. In embodiments, set of supervisory hosts 112 can communicate with an intermediate set or sets of hosts, gateways, or servers. In embodiments, set of supervisory hosts 112 can function as “overlord” hosts or servers which communicate command data 120 to an underlying or low-level set of targets 180, or other devices in managed network 116.
  • Set of supervisory hosts 112 can support or serve an underlying managed network 116, for example via a local area network, or other network(s) or connections. Managed network 116 including set of targets 180 can be or include a set of personal computers, network-enabled media devices, or other clients, devices, or machines. Other hierarchies, topologies, and connections between network management platform 102, set of supervisory hosts 112, any intermediate hosts, set of targets 180, and/or other entities or devices of managed network 116 can be used. In embodiments, communications between network management platform 102, set of supervisory hosts 112, set of targets 180, and/or other entities or devices in managed network 116 or other entities can be conducted via one or more secure channel 108, such as the secure channel and related resources described in co-pending U.S. application Ser. No. 12/130,424, filed May 30, 2008, entitled “Systems and Methods for Remote Management of Networked Systems Using Secure Modular Platform,” which published as U.S. Patent Application Publication No. ______, assigned or under obligation of assignment to the same entity as this application, and which application is incorporated by reference herein.
  • Network management platform 102 can include or access resources to support the generation and transmission of one or more discovery command 120 via auto-discovered or other pathways to manage set of supervisory hosts 112, set of targets 180, and/or other entities or devices of managed network 116, including a network store 104. Network store 104 can be or include a database or other data store, and in embodiments can store a network map 106. Network map 106 can record information related to the configuration and topology of network connections between set of supervisory hosts 112, set of targets 180, and/or other entities or devices of managed network 116, as well as other data. In embodiments, network map 106 can be recorded in a file, tree, database, or other record.
  • According to embodiments in one regard, network management platform 102 can access network map 106 to carry out management and maintenance operations on set of user IDs 162. Set of user IDs 162 can contain a set of user names, account names, account numbers, stored passwords, and/or other resources related to the identification and/or validation of users of managed network 116. According to embodiments, in general, each user ID in set of users IDs 162 can have an associated set of user data 164 hosted, stored, or located throughout the network of managed network 116.
  • Set of user data 164 can be or include any one or more of processes, services, user profiles, data files such as database, word processing, spreadsheet, media, or other data files, application files, passwords or other credentials, and/or other data related to the user identified by a given user ID in set of user IDs 162. Portions of user data in set of user data 164 can be located in diverse or multiple locations, such as in local or remote servers, personal computers or other client machines or devices, workstations, network-enabled mobile devices, databases, archives or RAID sites, or other nodes, facilities, or locations in managed network 116. Set of user data 164 can further comprise, for instance, files that contain references to a user ID which control access to applications or services, such as “/etc/group/.” Set of user data 164 can likewise include information such as aliases, groups, access control lists (ACLs), references by user ID or user name, or other information.
  • Network management platform 102 can determine a set of target IDs 166 in set of user IDs 162 to locate, modify, and/or remove set of user data 164 in or from managed network 116 and/or associated network or networks. In embodiments, set of target IDs 166 can be imported to network management platform 102, and/or can be manually specified by a systems administrator or other user. In embodiments, set of target IDs 166 can be generated by network management platform 102, for example, by identifying all user IDs that have not been used for a defined period of time, such as one year or other period of time.
  • As for instance illustrated in FIG. 2, once network management platform 102 has accessed, received, or generated set of target IDs 166, network management platform 102 can issue commands and/or invoke services to locate, modify, and/or purge set of target. IDs 166 and/or set of user data 164 associated with each of those user IDs. Network management platform 102 can generate one or more discovery command 120 to transmit to set of supervisory hosts 112, managed network 116, one or more networks 110, and/or other machines, locations, or resources. One or more discovery command 120 can contain an identification of set of target IDs 166 and other data to locate, identify, authenticate, and/or set of user data 164 associated with those IDs in the overall network. When network management platform 102 generates one or more discovery command 120, network management platform 102 can access network map 106 to identify one or more supervisory hosts in set of supervisory hosts 112 to or through which to transmit one or more discovery command 120. The recipient supervisory host(s) can receive one or more discovery command 120 and, in embodiments, access network map 106 and/or communicate with network management platform 102 to extract a pathway by which to relay or transmit one or more discovery command 120 to managed network 116 and/or other underlying devices. The supervisory host(s) can then transmit or relay the one or more discovery command 120 to a target or targets in managed network 116, using the identified pathway.
  • In embodiments, network management platform 102 can receive data back from set of supervisory hosts 112, managed network 116, and/or other resources indicating the presence of user data 164 for one or more user IDs in set of target lDs 166. Upon detection of user data 164 for those user IDs, network management platform 102can proceed to generate one or more modification command 168 to initiate a modification, update, migration, and/or deletion or removal of a portion or all of user data 164, and/or set of target IDs 166. For example, network management platform 102 can direct that files, directories, user profiles, and/or executing processes can be modified, updated, deleted, archived, terminated, removed, or otherwise processed to purge obsolete, inaccurate, insecure, or unwanted data. In embodiments, the modification can include substituting a new user ID for an obsolete user ID. In embodiments, the modification can include substituting new credentials, privileges, or other attributes for the existing attributes for the subject user ID. Other modifications or processing of set of target IDs 166 can be done. For example, two or more user IDs and associated user data 164 can be combined, or a single user ID can be split into multiple user data 164, IDs, or attributes.
  • According to various embodiments, network management platform 102 can be configured to periodically probe the network including set of manage machines 116, set of supervisory hosts 112, and/or other resources with repeated or additional one or more discovery command 120, to locate files, processes, and/or other user data 164 that was not present, visible, or identifiable during previous scans. In embodiments, a process of repeatedly interrogating the network for user data 164 can be repeated until a termination criteria are met, such as, for instance, the failure to discover any further user data 164 after a predetermined number of discovery attempts, or after a certain amount of time.
  • In terms of operational scope, it will be appreciated that any of network management platform 102, set of supervisory hosts 112, any intermediate hosts, and/or managed network 116 or other entities can be significantly or substantially geographically distributed, and can represent relatively large-scale groupings or clusters. For instance, different hosts in set of supervisory hosts 112 and/or associated targets in managed network 116 can be located in different metropolitan areas, in different sections of a country, in different countries, or in different continents. For further instance, different hosts in set of supervisory hosts 112 and/or sets of targets in managed network 116 can represent hundreds, thousands, or greater or lesser numbers of collective devices.
  • FIG. 3 illustrates an exemplary diagram of hardware and other resources that can be incorporated in a network management platform 102 configured to communicate with set of supervisory hosts 112, any intermediate hosts, set of targets 180, and/or other entities or devices of managed network 116 via one or more networks 110 or other connections, according to embodiments. In embodiments as shown, network management system 102 can comprise a processor 124 communicating with memory 126, such as electronic random access memory, operating under control of or in conjunction with operating system 130. Operating system 130 can be, for example, a distribution of the Linux™ operating system, the Unix™ operating system, or other open-source or proprietary operating system or platform. Processor 124 also communicates with network store 104, such as a database stored on a local hard drive. Processor 124 further communicates with network interface 128, such as an Ethernet or wireless data connection, which in turn communicates with one or more networks 110, such as the Internet or other public or private networks. Processor 124 also communicates with a network management module 132, which can be or include logic to monitor and manage the operation of network 110 and associated or connected resources. Network management module 132 can for instance permit a user to view, delegate, and execute configuration operations in set of supervisory hosts 112, set of targets 180, managed network 116, and/or other resources or entities. Other configurations of network management system 102, associated network connections, and other hardware and software resources are possible.
  • FIG. 4 illustrates overall processing for depopulation of user data from a network, according to various embodiments of the present teachings. In 402, processing can begin. In 404, a secure channel 108 can be established between network management platform 102 and one or more networks 110, set of supervisory hosts 112, set of targets 180, and/or other entities or devices of managed network 116. In embodiments, secure channel 108 can be or include a secure socket layer (SSL) connection, a public/private key infrastructure or connection, or other channel or connection. In 406, network management platform 102 can access, receive, or generate set of target IDs 166 reflecting user lDs whose associated user data 164 is to be scanned for in the overall network. In 408, network management platform 102 can transmit one or more discovery command 120 to one or more networks 110, set of supervisory hosts 112, set of targets 180, or other devices, entities or resources of managed network 116. In 410, network management platform 102 can receive one or more responses from the network indicating the presence of user data 164 associated with set of target IDs 166. User data 164 can be or include processes, services, user profiles, data files, application files, and/or other data.
  • In 412, network management platform 102 can proceed to generate one or more modification command 168 to initiate a modification, update, and/or deletion or removal of a portion or all of user data 164, and/or set of target IDs 166. For example, network management platform 102can direct that files, directories, user profiles, and/or executing processes can be modified, updated, deleted, archived, terminated, removed, or otherwise processed to purge obsolete, inaccurate, insecure, or unwanted data. In 414, the modification, updating, and/or deletion of user data 164 can be carried out. In 416, network management platform 102 can update set of user IDs 162 and/or any user data 164 to reflect the modifications or deletions, as appropriate. In 418, network management platform 102 can store a record of all locations in which one or more of set of target IDs 166 and/or user data 164 were found, to record a map of user ID/user data repositories within the network, as appropriate. In 420, as understood by persons skilled in the art, processing can repeat, return to a prior processing point, jump to a further processing point, or end.
  • The foregoing description is illustrative, and variations in configuration and implementation may occur to persons skilled in the art. For example, while embodiments have been described in which configuration commands or other data are generated and transmitted from one network management platform 102, in embodiments more than one server or other device or resource can serve as a central control point. For further example, while embodiments have been described in which one or more hosts in a set of supervisory hosts 112 coordinate the distribution of commands and data to a managed network 116, in embodiments, implementations can involve the dissemination of commands or other data through different network hierarchies, trees, nodes, or arrangements. For instance, in embodiments, commands or other data can be delegated via supervisory hosts through more than two sub-hosts or other sub-levels. For yet further example, while embodiments have been described involving one level or layer of supervisory hosts, in embodiments, the overall network can be configured with multiple levels or layers of supervisory hosts (or “overlords”). Similarly, various targets in managed network 116 can be configured at different levels within the overall network. For further example, while in embodiments the depopulation activity has been described as operating on a set of user IDs 162 and target IDs 166, in embodiments, other types of identifiers can be used. For example, in embodiments user data 164 associated with a given address, such as an Internet Protocol (IP) address, or other address or identifier, can be used to identify users or other entities for modification and/or removal. Other resources described as singular or integrated can in embodiments be plural or distributed, and resources described as multiple or distributed can in embodiments be combined. The scope of the present teachings is accordingly intended to be limited only by the following claims.

Claims (20)

1. A method of managing user information on a network, comprising:
identifying a least one user ID associated with at least one user having a changed status in a network;
automatically scanning a set of user processes, set of files, and a set of user profiles in the network to identify user data associated with the at least one user ID; and
modifying the set of user data in the network based on the changed status of the at least one user.
2. The method of claim 1, wherein the modifying comprises migrating the user data from the at least one user ID to at least a second user ID.
3. The method of claim 1, wherein the modifying comprises deleting the user data associated with the at least one user ID from the network.
4 The method of claim 1, wherein the automatically scanning comprises automatically communicating with all available nodes in the network via a secure channel to identify the user data associated with the at least one user ID.
5. The method of claim 1, wherein the changed status of the at least one user comprises at least one of a change in user name, a change in network user ID, a change in employment status, a change in level of security access level, and a change in network subscription status.
6. The method of claim 1, wherein the automatically scanning comprises an automatic interrogation process performed by a network management platform.
7. The method of claim 1, wherein the automatically scanning comprises multiple scanning of the network repeated until termination criteria are met.
8. A network management system, comprising:
an interface to a network; and
at least one network management engine, communicating via the interface with the network, the at least one network management engine being configured to—
identify a least one user ID associated with at least one user having a changed status in the network,
automatically scan a set of user processes, set of files, and a set of user profiles in the network to identify user data associated with the at least one user ID, and
modify the set of user data in the network based on the changed status of the at least one user.
9. The system of claim 8, wherein the at least one network management engine is further configured to migrate the user data from the at least one user ID to at least a second user ID.
10. The system of claim 8, wherein the network management engine is further configured to delete the user data associated with the at least one user ID from the network.
11. The system of claim 8, wherein the network management engine is further configured to automatically communicate with all available nodes in the network via a secure channel to identify the user data associated with the at least one user ID.
12. The system of claim 8, wherein the changed status of the at least one user comprises at least one of a change in user name, a change in network user ID, a change in employment status, a change in level of security access level, and a change in network subscription status.
13. The system of claim 8, wherein the network management engine is further configured to automatically repeat the scanning of the network until termination criteria are met.
14. A network, the network hosting a set of user data managed by a method comprising:
identifying a least one user ID associated with at least one user having a changed status in a network;
automatically scanning a set of user processes, set of files, and a set of user profiles in the network to identify user data associated with the at least one user ID; and
modifying the set of user data in the network based on the changed status of the at least one user.
15. The network of claim 14, wherein the modifying comprises migrating the user data from the at least one user ID to at least a second user ID.
16. The network of claim 14, wherein the modifying comprises deleting the user data associated with the at least one user ID from the network.
17. The network of claim 14, wherein the automatically scanning comprises automatically communicating with all available nodes in the network via a secure channel to identify the user data associated with the at least one user ID.
18. The network of claim 14, wherein the changed status of the at least one user comprises at least one of a change in user name, a change in network user ID, a change in employment status, a change in level of security access level, and a change in network subscription status.
19. The network of claim 14, wherein the automatically scanning comprises an automatic interrogation process performed by a network management platform.
20. The network of claim 14, wherein the automatically scanning comprises multiple scanning of the network repeated until termination criteria are met.
US12/395,456 2009-02-27 2009-02-27 Depopulation of user data from network Active 2032-04-18 US9558195B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/395,456 US9558195B2 (en) 2009-02-27 2009-02-27 Depopulation of user data from network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/395,456 US9558195B2 (en) 2009-02-27 2009-02-27 Depopulation of user data from network

Publications (2)

Publication Number Publication Date
US20100223369A1 true US20100223369A1 (en) 2010-09-02
US9558195B2 US9558195B2 (en) 2017-01-31

Family

ID=42667733

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/395,456 Active 2032-04-18 US9558195B2 (en) 2009-02-27 2009-02-27 Depopulation of user data from network

Country Status (1)

Country Link
US (1) US9558195B2 (en)

Citations (119)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787246A (en) * 1994-05-27 1998-07-28 Microsoft Corporation System for configuring devices for a computer system
US5835719A (en) * 1994-10-20 1998-11-10 Advanced Micro Devices, Inc. Apparatus and method for remote wake-up in system having interlinked networks
US5948062A (en) * 1995-10-27 1999-09-07 Emc Corporation Network file server using a cached disk array storing a network file directory including file locking information and data mover computers each having file system software for shared read-write file access
US5991758A (en) * 1997-06-06 1999-11-23 Madison Information Technologies, Inc. System and method for indexing information about entities from different information sources
US6105100A (en) * 1998-07-17 2000-08-15 International Business Machines Corporation Method and apparatus for detecting and initializing the addition of a new client machine in a network
US6212585B1 (en) * 1997-10-01 2001-04-03 Micron Electronics, Inc. Method of automatically configuring a server after hot add of a device
US6240407B1 (en) * 1998-04-29 2001-05-29 International Business Machines Corp. Method and apparatus for creating an index in a database system
US6243747B1 (en) * 1995-02-24 2001-06-05 Cabletron Systems, Inc. Method and apparatus for defining and enforcing policies for configuration management in communications networks
US6269405B1 (en) * 1998-10-19 2001-07-31 International Business Machines Corporation User account establishment and synchronization in heterogeneous networks
US6272536B1 (en) * 1996-07-24 2001-08-07 Marimba, Inc. System and method for the distribution of code and data
US6282652B1 (en) * 1998-02-26 2001-08-28 Sun Microsystems, Inc. System for separately designating security requirements for methods invoked on a computer
US20010047279A1 (en) * 2000-04-13 2001-11-29 Gargone Peter Sebastian Automating high-level business functions in a generic manner
US6381742B2 (en) * 1998-06-19 2002-04-30 Microsoft Corporation Software package management
US20020062259A1 (en) * 2000-09-26 2002-05-23 Katz James S. Server-side system responsive to peripherals
US20020078186A1 (en) * 2000-12-20 2002-06-20 International Business Machines Corporation Method and system for remote software distribution and installation
US6415289B1 (en) * 1998-03-19 2002-07-02 Williams Communications, Inc. Network information control method utilizing a common command format and a centralized storage management system
US20020095395A1 (en) * 2000-12-06 2002-07-18 Larson Jeffrey S. System and method of discovering information
US20020099787A1 (en) * 2001-01-12 2002-07-25 3Com Corporation Distributed configuration management on a network
US20020111840A1 (en) * 2001-02-15 2002-08-15 Bagdonas Edward P. Method and apparatus creation and performance of service engagement modeling
US6438711B2 (en) * 1998-07-15 2002-08-20 Intel Corporation Method and apparatus for performing field diagnostics on a computer system
US20020138567A1 (en) * 2001-03-21 2002-09-26 Nec Corporation Update system, update client apparatus, update server apparatus, and programs
US20020138578A1 (en) * 2001-01-24 2002-09-26 Qiaofeng Zhou Using virtual network address information during communications
US20020162028A1 (en) * 2001-04-25 2002-10-31 Paul Kennedy Access authentication for distributed networks
US6477572B1 (en) * 1998-12-17 2002-11-05 International Business Machines Corporation Method for displaying a network topology for a task deployment service
US6496831B1 (en) * 1999-03-25 2002-12-17 Lucent Technologies Inc. Real-time event processing system for telecommunications and other applications
US20030005097A1 (en) * 2001-06-28 2003-01-02 Barnard John D. Print queue manager
US6516427B1 (en) * 1999-11-05 2003-02-04 Hewlett-Packard Company Network-based remote diagnostic facility
US6526442B1 (en) * 1998-07-07 2003-02-25 Compaq Information Technologies Group, L.P. Programmable operational system for managing devices participating in a network
US20030055919A1 (en) * 2001-08-30 2003-03-20 Fong Ryan Patrick One-click deployment of data processing systems
US20030070110A1 (en) * 2001-10-04 2003-04-10 Nokia Corporation Crash recovery system
US20030069884A1 (en) * 2001-10-05 2003-04-10 Ajit Nair Database structure
US20030069946A1 (en) * 2001-10-05 2003-04-10 Adc Telecommunications, Inc. Central directory server
US6550021B1 (en) * 1999-09-30 2003-04-15 Western Digital Ventures, Inc. Internet-implemented method supporting component repair services
US20030074549A1 (en) * 2001-10-11 2003-04-17 International Business Machines Corporation Method and system for implementing a diagnostic or correciton boot image over a network connection
US6557169B1 (en) * 1998-10-11 2003-04-29 International Business Machines Corporation Method and system for changing the operating system of a workstation connected to a data transmission network
US20030083922A1 (en) * 2001-08-29 2003-05-01 Wendy Reed Systems and methods for managing critical interactions between an organization and customers
US20030110173A1 (en) * 2001-12-11 2003-06-12 Sun Microsystems, Inc. Methods and apparatus for managing multiple user systems
US20030119480A1 (en) * 2001-02-26 2003-06-26 Jahangir Mohammed Apparatus and method for provisioning an unlicensed wireless communications base station for operation within a licensed wireless communications system
US20030126585A1 (en) * 2002-01-03 2003-07-03 Parry Travis J. Multiple device error management
US6594664B1 (en) * 2000-01-04 2003-07-15 International Business Machines Corporation System and method for online/offline uninterrupted updating of rooms in collaboration space
US20030145083A1 (en) * 2001-11-16 2003-07-31 Cush Michael C. System and method for improving support for information technology through collecting, diagnosing and reporting configuration, metric, and event information
US6611869B1 (en) * 1999-10-28 2003-08-26 Networks Associates, Inc. System and method for providing trustworthy network security concern communication in an active security management environment
US6625742B1 (en) * 1999-11-05 2003-09-23 Hewlett-Packard Development Company, L.P. Computer diagnostic having an LED to provide direct visual feedback as to the status of the standby power supply when power button is actuated
US20030195921A1 (en) * 2002-03-19 2003-10-16 Becker Brian Eric System and method for configurable software provisioning
US20030212992A1 (en) * 1998-12-04 2003-11-13 Ronning Joel A. Apparatus and method for using application signatures for the identification of files
US20030233648A1 (en) * 2002-06-12 2003-12-18 Earl William J. System and method for managing software upgrades in a distributed computing system
US20040006616A1 (en) * 2002-05-23 2004-01-08 Hitachi, Ltd. Techniques for managing a storage environment
US6678888B1 (en) * 1999-08-26 2004-01-13 Hitachi, Ltd. Method and system for software distribution
US20040015957A1 (en) * 2001-05-10 2004-01-22 Zara Anna M. Method to map an inventory management system to a configuration management system
US20040015831A1 (en) * 2001-01-31 2004-01-22 Bowhill Allan J.C. Method and apparatus for building software packages
US20040019876A1 (en) * 2000-09-22 2004-01-29 Narad Networks, Inc. Network architecture for intelligent network elements
US6686838B1 (en) * 2000-09-06 2004-02-03 Xanboo Inc. Systems and methods for the automatic registration of devices
US20040024984A1 (en) * 2002-07-30 2004-02-05 Veritas Software Corporation Storage management software bridges
US6691225B1 (en) * 2000-04-14 2004-02-10 Stratus Technologies Bermuda Ltd. Method and apparatus for deterministically booting a computer system having redundant components
US20040044643A1 (en) * 2002-04-11 2004-03-04 Devries David A. Managing multiple virtual machines
US20040054789A1 (en) * 2002-09-12 2004-03-18 International Business Machines Corporation Pervasive home network portal
US20040059703A1 (en) * 2002-09-23 2004-03-25 Jerry Chappell Cascading behavior of package generation/installation based on variable parameters
US20040064501A1 (en) * 2002-09-30 2004-04-01 Jan Salman Jaffer Methods and apparatus for centralized provisioning of multi-domain web content
US20040088405A1 (en) * 2002-11-01 2004-05-06 Vikas Aggarwal Distributing queries and combining query responses in a fault and performance monitoring system using distributed data gathering and storage
US6745189B2 (en) * 2000-06-05 2004-06-01 International Business Machines Corporation System and method for enabling multi-indexing of objects
US6751659B1 (en) * 2000-03-31 2004-06-15 Intel Corporation Distributing policy information in a communication network
US6757837B1 (en) * 1999-10-19 2004-06-29 Tivo, Inc. Method and apparatus for software failure diagnosis and repair
US20040128375A1 (en) * 2002-10-16 2004-07-01 Xerox Corporation. Integrated server platform for the autonomous provisioning of device services
US20040143664A1 (en) * 2002-12-20 2004-07-22 Haruhiko Usa Method for allocating computer resource
US6769022B1 (en) * 1999-07-09 2004-07-27 Lsi Logic Corporation Methods and apparatus for managing heterogeneous storage devices
US6779004B1 (en) * 1999-06-11 2004-08-17 Microsoft Corporation Auto-configuring of peripheral on host/peripheral computing platform with peer networking-to-host/peripheral adapter for peer networking connectivity
US20040167975A1 (en) * 2003-02-20 2004-08-26 International Business Machines Corporation Method, system, and program for managing devices in a network
US20040215755A1 (en) * 2000-11-17 2004-10-28 O'neill Patrick J. System and method for updating and distributing information
US20040226010A1 (en) * 2000-10-31 2004-11-11 Loudcloud, Inc. Automated provisioning framework for internet site servers
US20040223469A1 (en) * 2001-09-17 2004-11-11 Microsoft Corporation System and method for concurrent operation of a wireless device in two disjoint wireless networks
US6845464B2 (en) * 2000-10-06 2005-01-18 Hewlett-Packard Development Company, L.P. Performing operating system recovery from external back-up media in a headless computer entity
US20050028025A1 (en) * 2003-07-08 2005-02-03 Zalewski Stephen H. Method and apparatus for creating a storage pool by dynamically mapping replication schema to provisioned storage volumes
US20050027608A1 (en) * 2003-07-29 2005-02-03 Andreas Wiesmuller System and method for providing commercial services over a wireless communication network
US6854010B1 (en) * 2001-04-05 2005-02-08 Bluecube Software, Inc. Multi-location management system
US20050050175A1 (en) * 2003-08-28 2005-03-03 International Business Machines Corporation Generic method for defining resource configuration profiles in provisioning systems
US6865737B1 (en) * 2000-08-23 2005-03-08 Microsoft Corporation Remote software installation and maintenance
US20050055350A1 (en) * 2000-05-25 2005-03-10 Werme Paul V. System specification language for resource management architecture and corresponding programs therefor
US20050102154A1 (en) * 2003-11-12 2005-05-12 Dodd Ryan A. Method, computer useable medium, and system for enterprise resource management
US20050108369A1 (en) * 2003-10-27 2005-05-19 Sather Dale A. Simple and dynamic configuration of network devices
US20050114474A1 (en) * 2003-11-20 2005-05-26 International Business Machines Corporation Automatic configuration of the network devices via connection to specific switch ports
US20050125525A1 (en) * 2003-12-09 2005-06-09 International Business Machines Method, system, and storage medium for providing intelligent distribution of software and files
US6925518B2 (en) * 2000-11-04 2005-08-02 Koninklijke Philips Electronics N.V. Bridging system for interoperation of remote groups of devices
US20050177829A1 (en) * 2003-10-10 2005-08-11 Vipul Vishwanath Method of applying constraints against discovered attributes in provisioning computers
US20050182796A1 (en) * 2004-02-12 2005-08-18 International Business Machines Corporation Method and system for protecting data associated with a replaced image file during a re-provisioning event
US6941518B2 (en) * 2001-06-29 2005-09-06 International Business Machines Corporation Method and system for booting of a target device in a network environment based on a provided administrator topology GUI
US20050198629A1 (en) * 2003-10-10 2005-09-08 Vipul Vishwanath Method and system for provisioning servers based on a policy and rule hierarchy
US6947939B2 (en) * 2002-05-08 2005-09-20 Hitachi, Ltd. System and methods to manage wide storage area network
US20050223374A1 (en) * 2002-06-21 2005-10-06 Koninklijke Philips Electronics N.V. Server side configuration management
US20050246421A1 (en) * 2004-05-01 2005-11-03 Microsoft Corporation System and method for discovering and publishing of presence information on a network
US6965886B2 (en) * 2001-11-01 2005-11-15 Actimize Ltd. System and method for analyzing and utilizing data, by executing complex analytical models in real time
US6986033B2 (en) * 2002-09-10 2006-01-10 Veritas Operating Corporation System for automated boot from disk image
US7003560B1 (en) * 1999-11-03 2006-02-21 Accenture Llp Data warehouse computing system
US20060039340A1 (en) * 2004-08-18 2006-02-23 Henry Ptasinski Method and system for transporting configuration protocol messages across a distribution system (DS) in a wireless local area network (WLAN)
US20060041767A1 (en) * 2004-08-20 2006-02-23 Maxwell Marcus A Methods, devices and computer program products for controlling power supplied to devices coupled to an uninterruptible power supply (UPS)
US7013461B2 (en) * 2001-01-05 2006-03-14 International Business Machines Corporation Systems and methods for service and role-based software distribution
US7020654B1 (en) * 2001-12-05 2006-03-28 Sun Microsystems, Inc. Methods and apparatus for indexing content
US20060080659A1 (en) * 2004-10-13 2006-04-13 Jp Mobile Operating, L.P. System and method of provisioning software to mobile devices
US20060080656A1 (en) * 2004-10-12 2006-04-13 Microsoft Corporation Methods and instructions for patch management
US7036010B2 (en) * 1999-12-08 2006-04-25 Hewlett-Packard Development Company, L.P. Method and apparatus for a secure communications session with a remote system via an access-controlling intermediate system
US20060095230A1 (en) * 2004-11-02 2006-05-04 Jeff Grier Method and system for enhancing machine diagnostics aids using statistical feedback
US7181444B2 (en) * 2000-11-21 2007-02-20 America Online, Inc. System and process for searching a network
US20070073894A1 (en) * 2005-09-14 2007-03-29 O Ya! Inc. Networked information indexing and search apparatus and method
US20070136265A1 (en) * 2005-12-13 2007-06-14 International Business Machines Corporation Apparatus, system, and method for automated identity relationship maintenance
US20070208745A1 (en) * 2006-03-01 2007-09-06 Oracle International Corporation Self-Service Sources for Secure Search
US20070214129A1 (en) * 2006-03-01 2007-09-13 Oracle International Corporation Flexible Authorization Model for Secure Search
US20070220268A1 (en) * 2006-03-01 2007-09-20 Oracle International Corporation Propagating User Identities In A Secure Federated Search System
US20080082467A1 (en) * 2006-09-28 2008-04-03 Microsoft Corporation Personal data mining
US7401137B1 (en) * 2003-12-31 2008-07-15 Emc Corporation Methods and apparatus for application of management actions to resources sharing relationships
US7469284B1 (en) * 2004-12-28 2008-12-23 Emc Corporation Methods and apparatus for assigning management responsibilities to multiple agents
US7548985B2 (en) * 2002-09-05 2009-06-16 Hewlett-Packard Development Company, L.P. System for managing user profile data
US20090164471A1 (en) * 2007-12-19 2009-06-25 Jinmei Shen Managing Distributed Data
US7558841B2 (en) * 2003-05-14 2009-07-07 Microsoft Corporation Method, system, and computer-readable medium for communicating results to a data query in a computer network
US7672928B2 (en) * 2004-09-30 2010-03-02 Microsoft Corporation Query forced indexing
US7716224B2 (en) * 2007-03-29 2010-05-11 Amazon Technologies, Inc. Search and indexing on a user device
US7774791B1 (en) * 2002-04-24 2010-08-10 Informatica Corporation System, method and computer program product for data event processing and composite applications
US20110010401A1 (en) * 2007-02-05 2011-01-13 Norm Adams Graphical user interface for the configuration of an algorithm for the matching of data records
US20120110458A1 (en) * 2009-01-27 2012-05-03 Brown Stephen J Mobile Content Capture and Discovery System based on Augmented User Identity
US8601539B1 (en) * 2006-09-06 2013-12-03 Dell Software Inc. Systems and methods for managing user permissions
US8875249B2 (en) * 2006-03-01 2014-10-28 Oracle International Corporation Minimum lifespan credentials for crawling data repositories

Family Cites Families (194)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6738970B1 (en) 1999-06-30 2004-05-18 Marimba, Inc. Method and apparatus for identifying changes made to a computer system due to software installation
US7197534B2 (en) 1998-09-01 2007-03-27 Big Fix, Inc. Method and apparatus for inspecting the properties of a computer
US7418504B2 (en) 1998-10-30 2008-08-26 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US6839759B2 (en) 1998-10-30 2005-01-04 Science Applications International Corp. Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information
US7315826B1 (en) 1999-05-27 2008-01-01 Accenture, Llp Comparatively analyzing vendors of components required for a web-based architecture
US7640325B1 (en) 1999-07-09 2009-12-29 Lsi Corporation Methods and apparatus for issuing updates to multiple management entities
US6654902B1 (en) 2000-04-11 2003-11-25 Hewlett-Packard Development Company, L.P. Persistent reservation IO barriers
AU7182701A (en) 2000-07-06 2002-01-21 David Paul Felsher Information record infrastructure, system and method
US7051101B1 (en) 2000-09-13 2006-05-23 Emc Corporation Methods and apparatus for controlling devices within storage network
WO2002025438A1 (en) 2000-09-22 2002-03-28 Patchlink.Com Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US7054924B1 (en) 2000-09-29 2006-05-30 Cisco Technology, Inc. Method and apparatus for provisioning network devices using instructions in extensible markup language
US7107330B1 (en) 2000-11-09 2006-09-12 International Business Machines Corporation Data processing system and method for distributing a device driver to a plurality of client computer systems each executing different operating systems
US7831692B2 (en) 2000-12-07 2010-11-09 International Business Machines Corporation Method and system for automatically associating an address with a target device
US7574481B2 (en) 2000-12-20 2009-08-11 Microsoft Corporation Method and system for enabling offline detection of software updates
US7305550B2 (en) 2000-12-29 2007-12-04 Intel Corporation System and method for providing authentication and verification services in an enhanced media gateway
US7165109B2 (en) 2001-01-12 2007-01-16 Microsoft Corporation Method and system to access software pertinent to an electronic peripheral device based on an address stored in a peripheral device
US7127742B2 (en) 2001-01-24 2006-10-24 Microsoft Corporation Establishing a secure connection with a private corporate network over a public network
JP2002287999A (en) 2001-03-26 2002-10-04 Duaxes Corp Server duplexing method, duplex server system, and duplex database server
US7133822B1 (en) 2001-03-29 2006-11-07 Xilinx, Inc. Network based diagnostic system and method for programmable hardware
US7403987B1 (en) 2001-06-29 2008-07-22 Symantec Operating Corporation Transactional SAN management
US7200662B2 (en) 2001-07-06 2007-04-03 Juniper Networks, Inc. Integrated rule network management system
US7305492B2 (en) 2001-07-06 2007-12-04 Juniper Networks, Inc. Content service aggregation system
US7082464B2 (en) 2001-07-06 2006-07-25 Juniper Networks, Inc. Network management system
US7383433B2 (en) 2001-07-31 2008-06-03 Sun Microsystems, Inc. Trust spectrum for certificate distribution in distributed peer-to-peer networks
US7284042B2 (en) 2001-08-14 2007-10-16 Endforce, Inc. Device plug-in system for configuring network device over a public network
US7213065B2 (en) 2001-11-08 2007-05-01 Racemi, Inc. System and method for dynamic server allocation and provisioning
US7200845B2 (en) 2001-12-03 2007-04-03 Hewlett-Packard Development Company, L.P. System and method for high availability firmware load
US7577722B1 (en) 2002-04-05 2009-08-18 Vmware, Inc. Provisioning of computer systems using virtual machines
US7082460B2 (en) 2002-04-19 2006-07-25 Axeda Corporation Configuring a network gateway
US7054618B1 (en) 2002-05-23 2006-05-30 Openwave Systems Inc. Method of registering a communication device with a proxy server based service
BR0215761A (en) 2002-06-18 2006-11-28 Computer Ass Think Inc methods and systems for managing enterprise resources
US7747730B1 (en) 2002-06-28 2010-06-29 Netfuel, Inc. Managing computer network resources
US8233893B2 (en) 2002-08-22 2012-07-31 Hewlett-Packard Development Company, L.P. Mobile handset update package generator that employs nodes technique
DE10240117A1 (en) 2002-08-30 2004-03-18 Ubs Ag Server component for e.g. public Internet has report generation processor that obtains electronic dossiers from databases to process standardized risk related data included in electronic dossiers to generate electronic risk report
US7058797B2 (en) 2002-09-10 2006-06-06 Veritas Operating Corporation Use of off-motherboard resources in a computer system
US7069428B2 (en) 2002-09-10 2006-06-27 Veritas Operating Corporation System for managing boot-up of target computers
US7047448B2 (en) 2002-11-21 2006-05-16 Bitfone Corporation Software self-repair toolkit for electronic devices
US7088238B2 (en) 2002-12-11 2006-08-08 Broadcom, Inc. Access, monitoring, and control of appliances via a media processing system
US7185071B2 (en) 2002-12-24 2007-02-27 International Business Machines Corporation Self-healing version and configuration model for an application server
US7480907B1 (en) 2003-01-09 2009-01-20 Hewlett-Packard Development Company, L.P. Mobile services network for update of firmware/software in mobile handsets
US8209680B1 (en) 2003-04-11 2012-06-26 Vmware, Inc. System and method for disk imaging on diverse computers
US7246156B2 (en) 2003-06-09 2007-07-17 Industrial Defender, Inc. Method and computer program product for monitoring an industrial network
US7350112B2 (en) 2003-06-16 2008-03-25 International Business Machines Corporation Automated diagnostic service
US8346929B1 (en) 2003-08-18 2013-01-01 Oracle America, Inc. System and method for generating secure Web service architectures using a Web Services security assessment methodology
US7509487B2 (en) 2003-09-29 2009-03-24 Gemalto Inc. Secure networking using a resource-constrained device
WO2005055072A1 (en) 2003-11-26 2005-06-16 Hewlett-Packard Development Company, L.P. System and method for management and installation of operating system images for computers
US7409463B2 (en) 2003-12-04 2008-08-05 International Business Machines Corporation On-demand active role-based software provisioning
US7519691B2 (en) 2003-12-04 2009-04-14 International Business Machines Corporation Selective update of console parameters from other consoles
US7827590B2 (en) 2003-12-10 2010-11-02 Aventail Llc Controlling access to a set of resources in a network
US7716286B2 (en) 2003-12-10 2010-05-11 Heins Douglas B Method and apparatus for utility computing in ad-hoc and configured peer-to-peer networks
US7207039B2 (en) 2003-12-24 2007-04-17 Intel Corporation Secure booting and provisioning
US7627617B2 (en) 2004-02-11 2009-12-01 Storage Technology Corporation Clustered hierarchical file services
US7600113B2 (en) 2004-02-20 2009-10-06 Microsoft Corporation Secure network channel
US8005937B2 (en) 2004-03-02 2011-08-23 Fatpot Technologies, Llc Dynamically integrating disparate computer-aided dispatch systems
JP2005301708A (en) 2004-04-13 2005-10-27 Hitachi Ltd Storage device system and software management method in same system
US7386761B2 (en) 2004-04-16 2008-06-10 International Business Machines Corporation Diagnostic repair system and method for computing systems
US7280830B2 (en) 2004-04-28 2007-10-09 Scenera Technologies, Llc Automatic registration services provided through a home relationship established between a device and a local area network
US7653008B2 (en) 2004-05-21 2010-01-26 Bea Systems, Inc. Dynamically configurable service oriented architecture
US7787863B2 (en) 2004-05-24 2010-08-31 Computer Associates Think, Inc. System and method for automatically configuring a mobile device
CN101031882B (en) 2004-06-08 2010-09-08 达尔特设备互操作有限公司 Architecture, apparatus and method for device team recruitment and content renditioning for universal device interoperability platform
US7734753B2 (en) 2004-10-12 2010-06-08 International Business Machines Corporation Apparatus, system, and method for facilitating management of logical nodes through a single management module
US7330967B1 (en) 2004-12-03 2008-02-12 Symantec Operating Corporation System and method for injecting drivers and setup information into pre-created images for image-based provisioning
US7827261B1 (en) 2004-12-22 2010-11-02 Crossroads Systems, Inc. System and method for device management
US20060173912A1 (en) 2004-12-27 2006-08-03 Eric Lindvall Automated deployment of operating system and data space to a server
US20060155857A1 (en) 2005-01-06 2006-07-13 Oracle International Corporation Deterministic session state management within a global cache array
US7310669B2 (en) 2005-01-19 2007-12-18 Lockdown Networks, Inc. Network appliance for vulnerability assessment auditing over multiple networks
US7430664B2 (en) 2005-02-02 2008-09-30 Innomedia Pte, Ltd System and method for securely providing a configuration file over and open network
JP4791818B2 (en) 2005-02-16 2011-10-12 株式会社リコー Managed apparatus, management system, managed apparatus control method, program, and recording medium
US20060190998A1 (en) 2005-02-17 2006-08-24 At&T Corp Determining firewall rules for reverse firewalls
US20060200658A1 (en) 2005-03-07 2006-09-07 Bitfone Corporation Agent framework for mobile devices
US7656810B2 (en) 2005-03-25 2010-02-02 Microsoft Corporation System and method for monitoring and reacting to peer-to-peer network metrics
US8370819B2 (en) 2005-03-25 2013-02-05 Microsoft Corporation Mechanism to store information describing a virtual machine in a virtual disk image
US20060230165A1 (en) 2005-03-25 2006-10-12 Zimmer Vincent J Method and apparatus for provisioning network infrastructure
US7716316B2 (en) 2005-03-29 2010-05-11 Microsoft Corporation Methods and systems for performing remote diagnostics
US8255362B2 (en) 2005-06-08 2012-08-28 rPath Methods, systems, and computer program products for provisioning software using local changesets that represent differences between software on a repository and a local system
US7434253B2 (en) 2005-07-14 2008-10-07 Microsoft Corporation User mapping information extension for protocols
US20070015538A1 (en) 2005-07-15 2007-01-18 Eugene Wang Network and method for the localization and customization of new mobile devices employing SIM/smart card
US9332424B2 (en) 2005-08-05 2016-05-03 Qualcomm Incorporated Centrally managed solution for all device management activities
CN100499494C (en) 2005-09-13 2009-06-10 华为技术有限公司 System for tele-managing local network device and realization method
US8949364B2 (en) 2005-09-15 2015-02-03 Ca, Inc. Apparatus, method and system for rapid delivery of distributed applications
US8429630B2 (en) 2005-09-15 2013-04-23 Ca, Inc. Globally distributed utility computing cloud
US20070067419A1 (en) 2005-09-19 2007-03-22 Bennett James D Dedicated client devices supporting web based service, specifications and interaction
US8131825B2 (en) 2005-10-07 2012-03-06 Citrix Systems, Inc. Method and a system for responding locally to requests for file metadata associated with files stored remotely
US7668974B2 (en) 2005-11-01 2010-02-23 International Business Machines Corporation Method and system for local provisioning of device drivers for portable storage devices
US7600005B2 (en) 2005-11-23 2009-10-06 Sun Microsystems, Inc. Method and apparatus for provisioning heterogeneous operating systems onto heterogeneous hardware systems
US20070168721A1 (en) 2005-12-22 2007-07-19 Nokia Corporation Method, network entity, system, electronic device and computer program product for backup and restore provisioning
US8117600B1 (en) 2005-12-29 2012-02-14 Symantec Operating Corporation System and method for detecting in-line synchronization primitives in binary applications
KR20070108432A (en) 2006-01-23 2007-11-12 엘지전자 주식회사 Method for scheduling device mangament
US20070174429A1 (en) 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
US8046441B2 (en) 2006-02-13 2011-10-25 Infosys Limited Business to business integration software as a service
US7890547B2 (en) 2006-03-22 2011-02-15 Oy International Business Machines Ab Content delivery server
WO2007112108A2 (en) 2006-03-24 2007-10-04 Bitfone Corporation Device and network capable of mobile diagnostics based on diagnostic management objects
US7606868B1 (en) 2006-03-30 2009-10-20 Wmware, Inc. Universal file access architecture for a heterogeneous computing environment
US20070234337A1 (en) 2006-03-31 2007-10-04 Prowess Consulting, Llc System and method for sanitizing a computer program
US8078728B1 (en) 2006-03-31 2011-12-13 Quest Software, Inc. Capacity pooling for application reservation and delivery
US20070244996A1 (en) 2006-04-14 2007-10-18 Sonasoft Corp., A California Corporation Web enabled exchange server standby solution using mailbox level replication
US8612556B2 (en) 2006-05-03 2013-12-17 Comcast Cable Holdings, Llc Method of provisioning network elements
US20070288612A1 (en) 2006-06-12 2007-12-13 Electronic Data Systems Corporation Assembly, and associated method, for provisioning computer device with computer data
US20070294376A1 (en) 2006-06-20 2007-12-20 International Business Machines Corporation Method, apparatus and program product for software provisioning
US8631150B2 (en) 2006-06-21 2014-01-14 Intel Corporation Method and apparatus for in-band management of storage devices
US7831997B2 (en) 2006-06-22 2010-11-09 Intel Corporation Secure and automatic provisioning of computer systems having embedded network devices
US20080002588A1 (en) 2006-06-30 2008-01-03 Mccaughan Sherry L Method and apparatus for routing data packets in a global IP network
WO2008008863A2 (en) 2006-07-12 2008-01-17 Sipera Systems, Inc. System, method and apparatus for troubleshooting an ip network
US8122111B2 (en) 2006-07-25 2012-02-21 Network Appliance, Inc. System and method for server configuration control and management
US7689664B2 (en) 2006-08-10 2010-03-30 Sony Ericsson Mobile Communications Ab System and method for installing and configuring software applications on a mobile networked terminal
US20080244325A1 (en) 2006-09-30 2008-10-02 Mikhail Tyulenev Automated software support system with backwards program execution and debugging
US7734717B2 (en) 2006-12-05 2010-06-08 Nokia Corporation Software distribution via peer-to-peer networks
WO2008085203A2 (en) 2006-12-29 2008-07-17 Prodea Systems, Inc. Presence status notification from digital endpoint devices through a multi-services gateway device at the user premises
US8279753B2 (en) 2007-01-11 2012-10-02 Oracle International Corporation Efficient determination of fast routes when voluminous data is to be sent from a single node to many destination nodes via other intermediate nodes
US8060874B2 (en) 2007-01-29 2011-11-15 Symbol Technologies, Inc. Efficient provisioning of software packages to mobile handheld devices
US9112891B2 (en) 2007-02-02 2015-08-18 Sharp Laboratories Of America, Inc. Remote firmware management for electronic devices
US20080196043A1 (en) 2007-02-08 2008-08-14 David Feinleib System and method for host and virtual machine administration
US8028048B2 (en) 2007-02-27 2011-09-27 International Business Machines Corporation Method and apparatus for policy-based provisioning in a virtualized service delivery environment
US8103783B2 (en) 2007-03-12 2012-01-24 Citrix Systems, Inc. Systems and methods of providing security and reliability to proxy caches
US20080235361A1 (en) 2007-03-21 2008-09-25 David Crosbie Management layer method and apparatus for dynamic assignment of users to computer resources
CN101271425A (en) 2007-03-23 2008-09-24 国际商业机器公司 Application program server pre-configuration system and method based on magnetic disk image outline
US8195866B2 (en) 2007-04-26 2012-06-05 Vmware, Inc. Adjusting available persistent storage during execution in a virtual computer system
US7971047B1 (en) 2007-09-10 2011-06-28 Vmware, Inc. Operating system environment and installation
US8132166B2 (en) 2007-05-14 2012-03-06 Red Hat, Inc. Methods and systems for provisioning software
JP4740897B2 (en) 2007-05-24 2011-08-03 株式会社日立製作所 Virtual network configuration method and network system
US20080294777A1 (en) 2007-05-25 2008-11-27 Alexei Karve Method and apparatus for template-based provisioning in a service delivery environment
US20080301666A1 (en) 2007-05-30 2008-12-04 Susan Gordon System for aggregating content data and methods relating to analysis of same
US7900248B2 (en) 2007-05-31 2011-03-01 Microsoft Corporation Access control negation using negative groups
US9769177B2 (en) 2007-06-12 2017-09-19 Syracuse University Role-based access control to computing resources in an inter-organizational community
US20080320110A1 (en) 2007-06-25 2008-12-25 Sharp Laboratories Of America, Inc. Firmware rollback and configuration restoration for electronic devices
US8701102B2 (en) 2007-06-27 2014-04-15 Microsoft Corporation Techniques for automatic software provisioning
US8069341B2 (en) 2007-06-29 2011-11-29 Microsoft Corporation Unified provisioning of physical and virtual images
US8346952B2 (en) 2007-08-21 2013-01-01 Netapp, Inc. De-centralization of group administration authority within a network storage architecture
US8832679B2 (en) 2007-08-28 2014-09-09 Red Hat, Inc. Registration process for determining compatibility with 32-bit or 64-bit software
US7895428B2 (en) 2007-09-28 2011-02-22 International Business Machines Corporation Applying firmware updates to servers in a data center
US20090089852A1 (en) 2007-10-01 2009-04-02 At&T Knowledge Ventures, Lp Automated Multimedia Channel Error Reporting from Viewer Premises
US8239422B2 (en) 2007-10-18 2012-08-07 At&T Intellectual Property I, Lp Methods and apparatus to provision network resource records
US9178857B2 (en) 2007-11-19 2015-11-03 Verizon Patent And Licensing Inc. System and method for secure configuration of network attached devices
US20090129597A1 (en) 2007-11-21 2009-05-21 Zimmer Vincent J Remote provisioning utilizing device identifier
CN102067519A (en) 2007-11-21 2011-05-18 阿尔卡特朗讯 Network service system based on role
US8949434B2 (en) 2007-12-17 2015-02-03 Microsoft Corporation Automatically provisioning a WWAN device
US9201647B2 (en) 2007-12-18 2015-12-01 Verizon Patent And Licensing Inc. Configuration management center
US20090164994A1 (en) 2007-12-20 2009-06-25 Virtual Computer, Inc. Virtual computing management systems and methods
WO2009085239A2 (en) 2007-12-20 2009-07-09 E-Fense, Inc. Computer forensics, e-discovery and incident response methods and systems
US20110040812A1 (en) 2007-12-20 2011-02-17 Virtual Computer, Inc. Layered Virtual File System
US8438618B2 (en) 2007-12-21 2013-05-07 Intel Corporation Provisioning active management technology (AMT) in computer systems
US8336089B1 (en) 2007-12-21 2012-12-18 Emc Corporation Method and apparatus for providing authentication and encryption services by a software as a service platform
JP2009157840A (en) 2007-12-27 2009-07-16 Toshiba Corp Electronic apparatus and method for power saving setting
US9086901B2 (en) 2008-03-07 2015-07-21 Sap Se Migration of applications from physical machines to virtual machines
US8621598B2 (en) 2008-03-12 2013-12-31 Intuit Inc. Method and apparatus for securely invoking a rest API
US8024428B2 (en) 2008-03-19 2011-09-20 The Go Daddy Group, Inc. Methods for updating WHOIS with information collected from non-controlling party
US8904368B2 (en) 2008-03-31 2014-12-02 International Business Machines Corporation Instantiating a composite application for different target platforms
US8429739B2 (en) 2008-03-31 2013-04-23 Amazon Technologies, Inc. Authorizing communications between computing nodes
US8103628B2 (en) 2008-04-09 2012-01-24 Harmonic Inc. Directed placement of data in a redundant data storage system
US20090265707A1 (en) 2008-04-21 2009-10-22 Microsoft Corporation Optimizing application performance on virtual machines automatically with end-user preferences
US8780738B2 (en) 2008-05-15 2014-07-15 At&T Intellectual Property I, L.P. Method and apparatus for supporting enterprise addressing in networks
US8713177B2 (en) 2008-05-30 2014-04-29 Red Hat, Inc. Remote management of networked systems using secure modular platform
US20100023740A1 (en) 2008-07-23 2010-01-28 Seagate Technology Llc Diagnostic utility and method for a data storage device
JP4722973B2 (en) 2008-08-12 2011-07-13 株式会社日立製作所 Request processing method and computer system
US9100297B2 (en) 2008-08-20 2015-08-04 Red Hat, Inc. Registering new machines in a software provisioning environment
US8930512B2 (en) 2008-08-21 2015-01-06 Red Hat, Inc. Providing remote software provisioning to machines
US8838827B2 (en) 2008-08-26 2014-09-16 Red Hat, Inc. Locating a provisioning server
US9477570B2 (en) 2008-08-26 2016-10-25 Red Hat, Inc. Monitoring software provisioning
US8793683B2 (en) 2008-08-28 2014-07-29 Red Hat, Inc. Importing software distributions in a software provisioning environment
US20100058327A1 (en) 2008-08-28 2010-03-04 Dehaan Michael Paul Methods and systems for providing customized actions related to software provisioning
US8244836B2 (en) 2008-08-29 2012-08-14 Red Hat, Inc. Methods and systems for assigning provisioning servers in a software provisioning environment
US9952845B2 (en) 2008-08-29 2018-04-24 Red Hat, Inc. Provisioning machines having virtual storage resources
US8103776B2 (en) 2008-08-29 2012-01-24 Red Hat, Inc. Systems and methods for storage allocation in provisioning of virtual machines
US9021470B2 (en) 2008-08-29 2015-04-28 Red Hat, Inc. Software provisioning in multiple network configuration environment
US9164749B2 (en) 2008-08-29 2015-10-20 Red Hat, Inc. Differential software provisioning on virtual machines having different configurations
US9111118B2 (en) 2008-08-29 2015-08-18 Red Hat, Inc. Managing access in a software provisioning environment
US8527578B2 (en) 2008-08-29 2013-09-03 Red Hat, Inc. Methods and systems for centrally managing multiple provisioning servers
US8612968B2 (en) 2008-09-26 2013-12-17 Red Hat, Inc. Methods and systems for managing network connections associated with provisioning objects in a software provisioning environment
US8326972B2 (en) 2008-09-26 2012-12-04 Red Hat, Inc. Methods and systems for managing network connections in a software provisioning environment
US20100100876A1 (en) 2008-10-21 2010-04-22 Enfora, Inc. Wireless device provisioning hardware tool
US8898305B2 (en) 2008-11-25 2014-11-25 Red Hat, Inc. Providing power management services in a software provisioning environment
US9124497B2 (en) 2008-11-26 2015-09-01 Red Hat, Inc. Supporting multiple name servers in a software provisioning environment
US8078712B2 (en) 2008-11-26 2011-12-13 Red Hat, Inc. Systems and methods for network command delegation using auto-discovered pathways
US8782204B2 (en) 2008-11-28 2014-07-15 Red Hat, Inc. Monitoring hardware resources in a software provisioning environment
US8832256B2 (en) 2008-11-28 2014-09-09 Red Hat, Inc. Providing a rescue Environment in a software provisioning environment
US8775578B2 (en) 2008-11-28 2014-07-08 Red Hat, Inc. Providing hardware updates in a software environment
US8402123B2 (en) 2009-02-24 2013-03-19 Red Hat, Inc. Systems and methods for inventorying un-provisioned systems in a software provisioning environment
US9727320B2 (en) 2009-02-25 2017-08-08 Red Hat, Inc. Configuration of provisioning servers in virtualized systems
US8892700B2 (en) 2009-02-26 2014-11-18 Red Hat, Inc. Collecting and altering firmware configurations of target machines in a software provisioning environment
US20100217944A1 (en) 2009-02-26 2010-08-26 Dehaan Michael Paul Systems and methods for managing configurations of storage devices in a software provisioning environment
US8413259B2 (en) 2009-02-26 2013-04-02 Red Hat, Inc. Methods and systems for secure gated file deployment associated with provisioning
US8640122B2 (en) 2009-02-27 2014-01-28 Red Hat, Inc. Systems and methods for abstracting software content management in a software provisioning environment
US9940208B2 (en) 2009-02-27 2018-04-10 Red Hat, Inc. Generating reverse installation file for network restoration
US8572587B2 (en) 2009-02-27 2013-10-29 Red Hat, Inc. Systems and methods for providing a library of virtual images in a software provisioning environment
US9411570B2 (en) 2009-02-27 2016-08-09 Red Hat, Inc. Integrating software provisioning and configuration management
US8667096B2 (en) 2009-02-27 2014-03-04 Red Hat, Inc. Automatically generating system restoration order for network recovery
US8990368B2 (en) 2009-02-27 2015-03-24 Red Hat, Inc. Discovery of network software relationships
US8135989B2 (en) 2009-02-27 2012-03-13 Red Hat, Inc. Systems and methods for interrogating diagnostic target using remotely loaded image
US8417926B2 (en) 2009-03-31 2013-04-09 Red Hat, Inc. Systems and methods for providing configuration management services from a provisioning server
US9250672B2 (en) 2009-05-27 2016-02-02 Red Hat, Inc. Cloning target machines in a software provisioning environment
US9134987B2 (en) 2009-05-29 2015-09-15 Red Hat, Inc. Retiring target machines by a provisioning server
US9047155B2 (en) 2009-06-30 2015-06-02 Red Hat, Inc. Message-based installation management using message bus
US8825819B2 (en) 2009-11-30 2014-09-02 Red Hat, Inc. Mounting specified storage resources from storage area network in machine provisioning platform
US10133485B2 (en) 2009-11-30 2018-11-20 Red Hat, Inc. Integrating storage resources from storage area network in machine provisioning platform

Patent Citations (122)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787246A (en) * 1994-05-27 1998-07-28 Microsoft Corporation System for configuring devices for a computer system
US5835719A (en) * 1994-10-20 1998-11-10 Advanced Micro Devices, Inc. Apparatus and method for remote wake-up in system having interlinked networks
US6243747B1 (en) * 1995-02-24 2001-06-05 Cabletron Systems, Inc. Method and apparatus for defining and enforcing policies for configuration management in communications networks
US5948062A (en) * 1995-10-27 1999-09-07 Emc Corporation Network file server using a cached disk array storing a network file directory including file locking information and data mover computers each having file system software for shared read-write file access
US6272536B1 (en) * 1996-07-24 2001-08-07 Marimba, Inc. System and method for the distribution of code and data
US5991758A (en) * 1997-06-06 1999-11-23 Madison Information Technologies, Inc. System and method for indexing information about entities from different information sources
US6212585B1 (en) * 1997-10-01 2001-04-03 Micron Electronics, Inc. Method of automatically configuring a server after hot add of a device
US6282652B1 (en) * 1998-02-26 2001-08-28 Sun Microsystems, Inc. System for separately designating security requirements for methods invoked on a computer
US6415289B1 (en) * 1998-03-19 2002-07-02 Williams Communications, Inc. Network information control method utilizing a common command format and a centralized storage management system
US6240407B1 (en) * 1998-04-29 2001-05-29 International Business Machines Corp. Method and apparatus for creating an index in a database system
US6381742B2 (en) * 1998-06-19 2002-04-30 Microsoft Corporation Software package management
US6526442B1 (en) * 1998-07-07 2003-02-25 Compaq Information Technologies Group, L.P. Programmable operational system for managing devices participating in a network
US6438711B2 (en) * 1998-07-15 2002-08-20 Intel Corporation Method and apparatus for performing field diagnostics on a computer system
US6105100A (en) * 1998-07-17 2000-08-15 International Business Machines Corporation Method and apparatus for detecting and initializing the addition of a new client machine in a network
US6557169B1 (en) * 1998-10-11 2003-04-29 International Business Machines Corporation Method and system for changing the operating system of a workstation connected to a data transmission network
US6269405B1 (en) * 1998-10-19 2001-07-31 International Business Machines Corporation User account establishment and synchronization in heterogeneous networks
US20030212992A1 (en) * 1998-12-04 2003-11-13 Ronning Joel A. Apparatus and method for using application signatures for the identification of files
US6477572B1 (en) * 1998-12-17 2002-11-05 International Business Machines Corporation Method for displaying a network topology for a task deployment service
US6496831B1 (en) * 1999-03-25 2002-12-17 Lucent Technologies Inc. Real-time event processing system for telecommunications and other applications
US6779004B1 (en) * 1999-06-11 2004-08-17 Microsoft Corporation Auto-configuring of peripheral on host/peripheral computing platform with peer networking-to-host/peripheral adapter for peer networking connectivity
US6769022B1 (en) * 1999-07-09 2004-07-27 Lsi Logic Corporation Methods and apparatus for managing heterogeneous storage devices
US6678888B1 (en) * 1999-08-26 2004-01-13 Hitachi, Ltd. Method and system for software distribution
US6550021B1 (en) * 1999-09-30 2003-04-15 Western Digital Ventures, Inc. Internet-implemented method supporting component repair services
US6757837B1 (en) * 1999-10-19 2004-06-29 Tivo, Inc. Method and apparatus for software failure diagnosis and repair
US6611869B1 (en) * 1999-10-28 2003-08-26 Networks Associates, Inc. System and method for providing trustworthy network security concern communication in an active security management environment
US7003560B1 (en) * 1999-11-03 2006-02-21 Accenture Llp Data warehouse computing system
US6625742B1 (en) * 1999-11-05 2003-09-23 Hewlett-Packard Development Company, L.P. Computer diagnostic having an LED to provide direct visual feedback as to the status of the standby power supply when power button is actuated
US6516427B1 (en) * 1999-11-05 2003-02-04 Hewlett-Packard Company Network-based remote diagnostic facility
US7036010B2 (en) * 1999-12-08 2006-04-25 Hewlett-Packard Development Company, L.P. Method and apparatus for a secure communications session with a remote system via an access-controlling intermediate system
US6594664B1 (en) * 2000-01-04 2003-07-15 International Business Machines Corporation System and method for online/offline uninterrupted updating of rooms in collaboration space
US6751659B1 (en) * 2000-03-31 2004-06-15 Intel Corporation Distributing policy information in a communication network
US20010047279A1 (en) * 2000-04-13 2001-11-29 Gargone Peter Sebastian Automating high-level business functions in a generic manner
US6691225B1 (en) * 2000-04-14 2004-02-10 Stratus Technologies Bermuda Ltd. Method and apparatus for deterministically booting a computer system having redundant components
US20050055350A1 (en) * 2000-05-25 2005-03-10 Werme Paul V. System specification language for resource management architecture and corresponding programs therefor
US6745189B2 (en) * 2000-06-05 2004-06-01 International Business Machines Corporation System and method for enabling multi-indexing of objects
US6865737B1 (en) * 2000-08-23 2005-03-08 Microsoft Corporation Remote software installation and maintenance
US6686838B1 (en) * 2000-09-06 2004-02-03 Xanboo Inc. Systems and methods for the automatic registration of devices
US20040019876A1 (en) * 2000-09-22 2004-01-29 Narad Networks, Inc. Network architecture for intelligent network elements
US20020062259A1 (en) * 2000-09-26 2002-05-23 Katz James S. Server-side system responsive to peripherals
US6845464B2 (en) * 2000-10-06 2005-01-18 Hewlett-Packard Development Company, L.P. Performing operating system recovery from external back-up media in a headless computer entity
US20040226010A1 (en) * 2000-10-31 2004-11-11 Loudcloud, Inc. Automated provisioning framework for internet site servers
US6925518B2 (en) * 2000-11-04 2005-08-02 Koninklijke Philips Electronics N.V. Bridging system for interoperation of remote groups of devices
US20040215755A1 (en) * 2000-11-17 2004-10-28 O'neill Patrick J. System and method for updating and distributing information
US7181444B2 (en) * 2000-11-21 2007-02-20 America Online, Inc. System and process for searching a network
US20020095395A1 (en) * 2000-12-06 2002-07-18 Larson Jeffrey S. System and method of discovering information
US7574413B2 (en) * 2000-12-06 2009-08-11 Sun Microsystems, Inc. System and method of discovering information
US20020078186A1 (en) * 2000-12-20 2002-06-20 International Business Machines Corporation Method and system for remote software distribution and installation
US7013461B2 (en) * 2001-01-05 2006-03-14 International Business Machines Corporation Systems and methods for service and role-based software distribution
US20020099787A1 (en) * 2001-01-12 2002-07-25 3Com Corporation Distributed configuration management on a network
US20020138578A1 (en) * 2001-01-24 2002-09-26 Qiaofeng Zhou Using virtual network address information during communications
US20040015831A1 (en) * 2001-01-31 2004-01-22 Bowhill Allan J.C. Method and apparatus for building software packages
US20020111840A1 (en) * 2001-02-15 2002-08-15 Bagdonas Edward P. Method and apparatus creation and performance of service engagement modeling
US20030119480A1 (en) * 2001-02-26 2003-06-26 Jahangir Mohammed Apparatus and method for provisioning an unlicensed wireless communications base station for operation within a licensed wireless communications system
US20020138567A1 (en) * 2001-03-21 2002-09-26 Nec Corporation Update system, update client apparatus, update server apparatus, and programs
US6854010B1 (en) * 2001-04-05 2005-02-08 Bluecube Software, Inc. Multi-location management system
US20020162028A1 (en) * 2001-04-25 2002-10-31 Paul Kennedy Access authentication for distributed networks
US20040015957A1 (en) * 2001-05-10 2004-01-22 Zara Anna M. Method to map an inventory management system to a configuration management system
US20030005097A1 (en) * 2001-06-28 2003-01-02 Barnard John D. Print queue manager
US6941518B2 (en) * 2001-06-29 2005-09-06 International Business Machines Corporation Method and system for booting of a target device in a network environment based on a provided administrator topology GUI
US20030083922A1 (en) * 2001-08-29 2003-05-01 Wendy Reed Systems and methods for managing critical interactions between an organization and customers
US20030055919A1 (en) * 2001-08-30 2003-03-20 Fong Ryan Patrick One-click deployment of data processing systems
US20040223469A1 (en) * 2001-09-17 2004-11-11 Microsoft Corporation System and method for concurrent operation of a wireless device in two disjoint wireless networks
US20030070110A1 (en) * 2001-10-04 2003-04-10 Nokia Corporation Crash recovery system
US20030069884A1 (en) * 2001-10-05 2003-04-10 Ajit Nair Database structure
US20030069946A1 (en) * 2001-10-05 2003-04-10 Adc Telecommunications, Inc. Central directory server
US20030074549A1 (en) * 2001-10-11 2003-04-17 International Business Machines Corporation Method and system for implementing a diagnostic or correciton boot image over a network connection
US6965886B2 (en) * 2001-11-01 2005-11-15 Actimize Ltd. System and method for analyzing and utilizing data, by executing complex analytical models in real time
US20030145083A1 (en) * 2001-11-16 2003-07-31 Cush Michael C. System and method for improving support for information technology through collecting, diagnosing and reporting configuration, metric, and event information
US7020654B1 (en) * 2001-12-05 2006-03-28 Sun Microsystems, Inc. Methods and apparatus for indexing content
US20030110173A1 (en) * 2001-12-11 2003-06-12 Sun Microsystems, Inc. Methods and apparatus for managing multiple user systems
US20030126585A1 (en) * 2002-01-03 2003-07-03 Parry Travis J. Multiple device error management
US20030195921A1 (en) * 2002-03-19 2003-10-16 Becker Brian Eric System and method for configurable software provisioning
US20040044643A1 (en) * 2002-04-11 2004-03-04 Devries David A. Managing multiple virtual machines
US7774791B1 (en) * 2002-04-24 2010-08-10 Informatica Corporation System, method and computer program product for data event processing and composite applications
US6947939B2 (en) * 2002-05-08 2005-09-20 Hitachi, Ltd. System and methods to manage wide storage area network
US20040006616A1 (en) * 2002-05-23 2004-01-08 Hitachi, Ltd. Techniques for managing a storage environment
US20030233648A1 (en) * 2002-06-12 2003-12-18 Earl William J. System and method for managing software upgrades in a distributed computing system
US6966058B2 (en) * 2002-06-12 2005-11-15 Agami Systems, Inc. System and method for managing software upgrades in a distributed computing system
US20050223374A1 (en) * 2002-06-21 2005-10-06 Koninklijke Philips Electronics N.V. Server side configuration management
US20040024984A1 (en) * 2002-07-30 2004-02-05 Veritas Software Corporation Storage management software bridges
US7548985B2 (en) * 2002-09-05 2009-06-16 Hewlett-Packard Development Company, L.P. System for managing user profile data
US6986033B2 (en) * 2002-09-10 2006-01-10 Veritas Operating Corporation System for automated boot from disk image
US20040054789A1 (en) * 2002-09-12 2004-03-18 International Business Machines Corporation Pervasive home network portal
US20040059703A1 (en) * 2002-09-23 2004-03-25 Jerry Chappell Cascading behavior of package generation/installation based on variable parameters
US20040064501A1 (en) * 2002-09-30 2004-04-01 Jan Salman Jaffer Methods and apparatus for centralized provisioning of multi-domain web content
US20040128375A1 (en) * 2002-10-16 2004-07-01 Xerox Corporation. Integrated server platform for the autonomous provisioning of device services
US20040088405A1 (en) * 2002-11-01 2004-05-06 Vikas Aggarwal Distributing queries and combining query responses in a fault and performance monitoring system using distributed data gathering and storage
US20040143664A1 (en) * 2002-12-20 2004-07-22 Haruhiko Usa Method for allocating computer resource
US20040167975A1 (en) * 2003-02-20 2004-08-26 International Business Machines Corporation Method, system, and program for managing devices in a network
US7558841B2 (en) * 2003-05-14 2009-07-07 Microsoft Corporation Method, system, and computer-readable medium for communicating results to a data query in a computer network
US20050028025A1 (en) * 2003-07-08 2005-02-03 Zalewski Stephen H. Method and apparatus for creating a storage pool by dynamically mapping replication schema to provisioned storage volumes
US20050027608A1 (en) * 2003-07-29 2005-02-03 Andreas Wiesmuller System and method for providing commercial services over a wireless communication network
US20050050175A1 (en) * 2003-08-28 2005-03-03 International Business Machines Corporation Generic method for defining resource configuration profiles in provisioning systems
US20050198629A1 (en) * 2003-10-10 2005-09-08 Vipul Vishwanath Method and system for provisioning servers based on a policy and rule hierarchy
US20050177829A1 (en) * 2003-10-10 2005-08-11 Vipul Vishwanath Method of applying constraints against discovered attributes in provisioning computers
US20050108369A1 (en) * 2003-10-27 2005-05-19 Sather Dale A. Simple and dynamic configuration of network devices
US20050102154A1 (en) * 2003-11-12 2005-05-12 Dodd Ryan A. Method, computer useable medium, and system for enterprise resource management
US20050114474A1 (en) * 2003-11-20 2005-05-26 International Business Machines Corporation Automatic configuration of the network devices via connection to specific switch ports
US20050125525A1 (en) * 2003-12-09 2005-06-09 International Business Machines Method, system, and storage medium for providing intelligent distribution of software and files
US7401137B1 (en) * 2003-12-31 2008-07-15 Emc Corporation Methods and apparatus for application of management actions to resources sharing relationships
US20050182796A1 (en) * 2004-02-12 2005-08-18 International Business Machines Corporation Method and system for protecting data associated with a replaced image file during a re-provisioning event
US20050246421A1 (en) * 2004-05-01 2005-11-03 Microsoft Corporation System and method for discovering and publishing of presence information on a network
US20060039340A1 (en) * 2004-08-18 2006-02-23 Henry Ptasinski Method and system for transporting configuration protocol messages across a distribution system (DS) in a wireless local area network (WLAN)
US20060041767A1 (en) * 2004-08-20 2006-02-23 Maxwell Marcus A Methods, devices and computer program products for controlling power supplied to devices coupled to an uninterruptible power supply (UPS)
US7672928B2 (en) * 2004-09-30 2010-03-02 Microsoft Corporation Query forced indexing
US20060080656A1 (en) * 2004-10-12 2006-04-13 Microsoft Corporation Methods and instructions for patch management
US20060080659A1 (en) * 2004-10-13 2006-04-13 Jp Mobile Operating, L.P. System and method of provisioning software to mobile devices
US20060095230A1 (en) * 2004-11-02 2006-05-04 Jeff Grier Method and system for enhancing machine diagnostics aids using statistical feedback
US7469284B1 (en) * 2004-12-28 2008-12-23 Emc Corporation Methods and apparatus for assigning management responsibilities to multiple agents
US20070073894A1 (en) * 2005-09-14 2007-03-29 O Ya! Inc. Networked information indexing and search apparatus and method
US20070136265A1 (en) * 2005-12-13 2007-06-14 International Business Machines Corporation Apparatus, system, and method for automated identity relationship maintenance
US20070220268A1 (en) * 2006-03-01 2007-09-20 Oracle International Corporation Propagating User Identities In A Secure Federated Search System
US20070214129A1 (en) * 2006-03-01 2007-09-13 Oracle International Corporation Flexible Authorization Model for Secure Search
US20070208745A1 (en) * 2006-03-01 2007-09-06 Oracle International Corporation Self-Service Sources for Secure Search
US8875249B2 (en) * 2006-03-01 2014-10-28 Oracle International Corporation Minimum lifespan credentials for crawling data repositories
US9081816B2 (en) * 2006-03-01 2015-07-14 Oracle International Corporation Propagating user identities in a secure federated search system
US8601539B1 (en) * 2006-09-06 2013-12-03 Dell Software Inc. Systems and methods for managing user permissions
US20080082467A1 (en) * 2006-09-28 2008-04-03 Microsoft Corporation Personal data mining
US20110010401A1 (en) * 2007-02-05 2011-01-13 Norm Adams Graphical user interface for the configuration of an algorithm for the matching of data records
US7716224B2 (en) * 2007-03-29 2010-05-11 Amazon Technologies, Inc. Search and indexing on a user device
US20090164471A1 (en) * 2007-12-19 2009-06-25 Jinmei Shen Managing Distributed Data
US20120110458A1 (en) * 2009-01-27 2012-05-03 Brown Stephen J Mobile Content Capture and Discovery System based on Augmented User Identity

Also Published As

Publication number Publication date
US9558195B2 (en) 2017-01-31

Similar Documents

Publication Publication Date Title
US8255409B2 (en) Systems and methods for generating a change log for files in a managed network
US20230396583A1 (en) Dynamic firewall configuration
US8285753B2 (en) Change approvals for computing systems
US6192405B1 (en) Method and apparatus for acquiring authorized access to resources in a distributed system
US6708170B1 (en) Method and system for usage of non-local data within a lightweight directory access protocol directory environment
US9009696B2 (en) Generating encoded identifications of selected subsets of installed software packages on a client machine
US20040019889A1 (en) Software distribution via stages
US7133917B2 (en) System and method for distribution of software licenses in a networked computing environment
US20020174422A1 (en) Software distribution system
EP1589691B1 (en) Method, system and apparatus for managing computer identity
EP2696555B1 (en) Method and system for identifying storage device
EP2361465B1 (en) Retrieving configuration records from a configuration management database
US20150121485A1 (en) Configuration of network devices
US20080046576A1 (en) System and method for detecting unused accounts in a distributed directory service
US9772834B2 (en) Exportable encoded identifications of networked machines
CN112261172A (en) Service addressing access method, device, system, equipment and medium
KR20130114575A (en) Leader arbitration for provisioning services
US8745175B2 (en) Automatic application provisioning
CN107547512B (en) User authentication method and device in multi-level cloud platform
CN108076165B (en) Method, equipment and system for domain name resolution information management
CN110008006B (en) Container-based big data tool deployment method and system
US9558195B2 (en) Depopulation of user data from network
US11489852B2 (en) Method for protecting a private computer network
KR101993723B1 (en) Security policy automation support system and method
KR101087145B1 (en) Provision management system and method for bulk setting provision profile in the system

Legal Events

Date Code Title Description
AS Assignment

Owner name: RED HAT, INC., NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DEHAAN, MICHAEL PAUL;LIKINS, ADRIAN KARSTAN;VIDAL, SETH KELBY;REEL/FRAME:022327/0372

Effective date: 20090227

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4